• Title/Summary/Keyword: second-order system

Search Result 3,286, Processing Time 0.028 seconds

A Study on a Type of Regeneration Project on Old Industrial Complex (노후산업단지 재생사업 추진 유형에 관한 연구)

  • Kim, Joo-hoon;Byun, Byung-seol
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.21 no.2
    • /
    • pp.192-211
    • /
    • 2018
  • With significant influences of old industrial complex in September 2009, Ministry of Land, Infrastructure and Transport chose the 4 districts for the first pilot project. In December 2014, the second pilot project districts were established. In addition, there were 10 districts in April 2016 and 5 districts in April 2016 as the third pilot project and 5 districts in March 2017 as the fourth pilot project. In order to promote smooth business operation of the recycling business, we introduced the effective area designation and special system as stipulated in Article 39.12-13 of the Industrial Location and Development Act revised in May 2015. The effective area, It is a method that can promote propagation and diffusion of the rehabilitation business through visualization by making effective the promotion of the rehabilitation business and by promoting the business in consideration of the geographical feature of the region and industry group, The setting of the unreasonable effective area is based on the criteria and classification of the plan and the objective promotion method according to the individual characteristics of the aged industrial park because the delay of the rehabilitation business and the possibility of the increase of many problems are presented Be sure to Data Envelopment Analysis (DEA) and the old industrial complex database were constructed and utilized to classify the types of recycling projects. Therefore, in this study, it is necessary to strengthen the competitiveness of aged industrial complex by examining the correlation between the diagnosis of 83 aged industrial complex sites and the rehabilitation projects supported by the Ministry of Land, and the types of business promotion for aged industrial parks. It can be used as a guideline for the feasibility of the project.

Private Income Transfers and Old-Age Income Security (사적소득이전과 노후소득보장)

  • Kim, Hisam
    • KDI Journal of Economic Policy
    • /
    • v.30 no.1
    • /
    • pp.71-130
    • /
    • 2008
  • Using data from the Korean Labor & Income Panel Study (KLIPS), this study investigates private income transfers in Korea, where adult children have undertaken the most responsibility of supporting their elderly parents without well-established social safety net for the elderly. According to the KLIPS data, three out of five households provided some type of support for their aged parents and two out of five households of the elderly received financial support from their adult children on a regular base. However, the private income transfers in Korea are not enough to alleviate the impact of the fall in the earned income of those who retired and are approaching an age of needing financial assistance from external source. The monthly income of those at least the age of 75, even with the earning of their spouses, is below the staggering amount of 450,000 won, which indicates that the elderly in Korea are at high risk of poverty. In order to analyze microeconomic factors affecting the private income transfers to the elderly parents, the following three samples extracted from the KLIPS data are used: a sample of respondents of age 50 or older with detailed information on their financial status; a five-year household panel sample in which their unobserved family-specific and time-invariant characteristics can be controlled by the fixed-effects model; and a sample of the younger split-off household in which characteristics of both the elderly household and their adult children household can be controlled simultaneously. The results of estimating private income transfer models using these samples can be summarized as follows. First, the dominant motive lies on the children-to-parent altruistic relationship. Additionally, another is based on exchange motive, which is paid to the elderly parents who take care of their grandchildren. Second, the amount of private income transfers has negative correlation with the income of the elderly parents, while being positively correlated with the income of the adult children. However, its income elasticity is not that high. Third, the amount of private income transfers shows a pattern of reaching the highest level when the elderly parents are in the age of 75 years old, following a decreasing pattern thereafter. Fourth, public assistance, such as the National Basic Livelihood Security benefit, appears to crowd out private transfers. Private transfers have fared better than public transfers in alleviating elderly poverty, but the role of public transfers has been increasing rapidly since the welfare expansion after the financial crisis in the late 1990s, so that one of four elderly people depends on public transfers as their main income source in 2003. As of the same year, however, there existed and occupied 12% of the elderly households those who seemed eligible for the National Basic Livelihood benefit but did not receive any public assistance. To remove elderly poverty, government may need to improve welfare delivery system as well as to increase welfare budget for the poor. In the face of persistent elderly poverty and increasing demand for public support for the elderly, which will lead to increasing government debt, welfare policy needs targeting toward the neediest rather than expanding universal benefits that have less effect of income redistribution and heavier cost. Identifying every disadvantaged elderly in dire need for economic support and providing them with the basic livelihood security would be the most important and imminent responsibility that we all should assume to prepare for the growing aged population, and this also should accompany measures to utilize the elderly workforce with enough capability and strong will to work.

A Study on the Nurse's Due Care in Medical Malpractice (의료과오시(醫療過誤時) 간호사의(看護師)의 주의의무(注意義務)에 관한 연구(硏究))

  • Kang, Sun-Joo
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.5 no.1
    • /
    • pp.113-136
    • /
    • 1999
  • There are some new trends in judgments concerning medical malpractice. which include emphasis on medical professionals' explanation duty in order to materialize patient's rights of self-determination. Now, patient is not a mere subject of medical and nursing care any more, but a subject, participating in medical practice on equal terms with medical professionals. Legal accountability is no limited to nurses in advanced practice: it is a recognized fact of life for every practicing nurse. whether she is an RN employed as a staff nurse in a hospital, a Certified Nurse-Midwife in independent practice or a patient's home. Therefore, it is essential for nurses to be as familiar as possible with the legal guidelines that govern their patient care responsibilities. However there are only a few studies focused on nursing negligence. To define nurse's civil liability in medical malpractice, it is necessary to indentify both legal nursing behaviors and nurse's due care in those nursing behaviors. So this paper focused on nurse's due care, especially in nursing malpractice. To clarify nurses' due care. chapter II has focused on nursing behavior and the scope of nursing practice based on the medical law and health care related study results. Chapter III deals with the content and scope of nurse's due care. Generally. negligence is defined as not doing something which a resonable person. guided by those ordinary considerations which or dinarily regulate human affairs. would do. or doing something which a resonable and prudent man would not do. Next. it describes how we can set the standard of due care in nursing practice. There is objective factors and subjective factors. And we also discuss about the limitation of due care in nursing practice. Finally. chapter IV deals with the case studies related to nursing negligence in the situation of determination. Now', patient is not a mere subject of medical and nursing care any more, but a subject participating in medical practice on equal terms with medical professionals. Legal accountability is not limited to nurses in advanced practice; it is a recognized fact of life for every practicing nurse. whether she is an RN employed as a staff nurse in a hospital. a Certified Nurse-Midwife in independent practice or a patient's home. Therefore, it is essential for nurses to be as familiar as possible with the legal guidelines that govern their patient care responsibilities. However. there are only a few studies focused on nursing negligence. To define nurse's civil liability in medical malpractice, it is necessary to identify both legal nursing behaviors and nurse's due care in those nursing behaviors. So this paper focused on nurse's intravenous injection. post operation nursing care. blood transfusion. and patient nursing care. The result of this paper is as follows. First. there are several cases dealing with nurse's negligence in nursing practice. however, those cases didn't judge nurse's due care based on individual -specific standard but general-objective standard. Second, there is a tendency to put an emphasis on the principal of belief to distinguish who has the liability in the case of medical malpractice among medical care team. So nurses shoud practice nursing care more actively to protect themselves and patients because there is an effort to form professional nurse system and the scope of nursing practice will be deeper and broader. Third, standard of care is a necessary element in establishing negligence. If a nurse is able to meet the standard of care, no breach will be found.

  • PDF

A Study on University Students' Business Planning and Starting up a Business in Korea (우리나라 대학생들의 창업 및 사업계획에 대한 연구)

  • Koh, In-Kon
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.7 no.2
    • /
    • pp.1-8
    • /
    • 2012
  • Recently the youth starting up a business has become a buzzword. Business plan is a fundamentals in starting up a business. Therefore, in this study, I investigated the business planning behavior of university students in Korea. Especially, I investigated whether university students in Korea dealt with business plan inside and outside or not, and examined university students' thought whether corporate performance is related to business plan or not, and if any, how closely they are. Meanwhile, existing studies and books are arguing that there is a high correlation between business plan and corporate performance, however, there are not many domestic and/or foreign studies that analyzed it empirically. In order to find an answer to this problem, this study was approached empirically. First, the components of business plan were selected through an extensive literature review including existing researches and through factor analysis, I classified them into the five factors of product management, product development, management support system building, organizational management and macro planning. Also, I classified corporate performance into quantitative and qualitative performance, and investigated the influences of business plan factors on those performances. As a result, I found belows. First, university students in Korea thought that the business plan components affected the quantitative and qualitative performances of corporate positively. Second, Korean students had high interests in starting up a business and wanted to run a service business but had almost no experience of business planning. Whilst, Foreign students had relatively high interests in starting up a business and experiences of business planning. They wanted starting up in various industry also. Meanwhile, I did't find the gender differences in those aspects. In this study, I empirically investigated the relation between business plan components and corporate performances in the university students' view, not that of company. So I believe that this study can shed lights on the direction of effective starting up education for increasing the success rate of youth starting up a business.

  • PDF

The Effects of Psychological Contract Violation on OS User's Betrayal Behaviors: Window XP Technical Support Ending Case (심리적 계약 위반이 OS이용자의 배신 행동에 미치는 영향: 윈도우 XP 기술적 지원서비스 중단 사례)

  • Lee, Un-Kon
    • Asia pacific journal of information systems
    • /
    • v.24 no.3
    • /
    • pp.325-344
    • /
    • 2014
  • Technical support of Window XP ended in March, 8, 2014, and it makes OS(Operating System) users fall in a state of confusion. Sudden decision making of OS upgrade and replacement is not a simple problem. Firms need to change the long term capacity plan in enterprise IS management, but they are pressed for time and cost to complete it. Individuals can not help selecting the second best plan, because the following OSs of Window XP are below expectations in performances, new PC sales as the opportunities of OS upgrade decrease, and the potential risk of OS technical support ending had not announced to OS users at the point of purchase. Microsoft as the OS vendors had not presented precaution or remedy for this confusion. Rather, Microsoft announced that the technical support of the other following OSs of Wndow XP such as Window 7 would ended in two years. This conflict between OS vendor and OS users could not happen in one time, but could recur in recent future. Although studies on the ways of OS user protection policy would be needed to escape from this conflict, few prior studies had conducted this issue. This study had challenge to cautiously investigate in such OS user's reactions as the confirmation with OS user's expectation in the point of purchase, three types of justice perception on the treatment of OS vendor, psychological contract violation, satisfaction and the other betrayal behavioral intention in the case of Window XP technical support ending. By adopting the justice perception on this research, and by empirically validating the impact on OS user's reactions, I could suggest the direction of establishing OS user protection policy of OS vendor. Based on the expectation-confirmation theory, the theory of justice, literatures about psychological contract violation, and studies about consumer betrayal behaviors in the perspective of Herzberg(1968)'s dual factor theory, I developed the research model and hypothesis. Expectation-confirmation theory explain that consumers had expectation on the performance of product in the point of sale, and they could satisfied with their purchase behaviors, when the expectation could have confirmed in the point of consumption. The theory of justice in social exchange argues that treatee could be willing to accept the treatment by treater when the three types of justice as distributive, procedural, and interactional justice could be established in treatment. Literatures about psychological contract violation in human behaviors explains that contracter in a side could have the implied contract (also called 'psychological contract') which the contracter in the other side would sincerely execute the contract, and that they are willing to do vengeance behaviors when their contract had unfairly been broken. When the psychological contract of consumers had been broken, consumers feel distrust with the vendors and are willing to decrease such beneficial attitude and behavior as satisfaction, loyalty and repurchase intention. At the same time, consumers feel betrayal and are willing to increase such retributive attitude and behavior as negative word-of-mouth, complain to the vendors, complain to the third parties for consumer protection. We conducted a scenario survey in order to validate our research model at March, 2013, when is the point of news released firstly and when is the point of one year before the acture Window XP technical support ending. We collected the valid data from 238 voluntary participants who are the OS users but had not yet exposed the news of Window OSs technical support ending schedule. The subject had been allocated into two groups and one of two groups had been exposed this news. The data had been analyzed by the MANOVA and PLS. MANOVA results indicate that the OSs technical support ending could significantly decrease all three types of justice perception. PLS results indicated that it could significantly increase psychological contract violation and that this increased psychological contract violation could significantly reduce the trust and increase the perceived betrayal. Then, it could significantly reduce satisfaction, loyalty, and repurchase intention, and it also could significantly increase negative word-of-month intention, complain to the vendor intention, and complain to the third party intention. All hypothesis had been significantly approved. Consequently, OS users feel that the OSs technical support ending is not natural value added service ending, but the violation of the core OS purchase contract, that it could be the posteriori prohibition of OS user's OS usage right, and that it could induce the psychological contract violation of OS users. This study would contributions to introduce the psychological contract violation of the OS users from the OSs technical support ending in IS field, to introduce three types of justice as the antecedents of psychological contract violation, and to empirically validate the impact of psychological contract violation both on the beneficial and retributive behavioral intentions of OS users. For practice, the results of this study could contribute to make more comprehensive OS user protection policy and consumer relationship management practices of OS vendor.

A Case Study on the Exogenous Factors affecting Extra-large Egg Production in a Layer Farm in Korea (산란계 사육농장 특란 생산에 미치는 외부 요인 분석을 위한 사례 연구)

  • Lee, Hyun-Chang;Jang, Woo-Whan
    • Korean Journal of Poultry Science
    • /
    • v.41 no.2
    • /
    • pp.99-104
    • /
    • 2014
  • The objective of this study is to analyze the production of extra-large egg and assess the impacts of exogenous factors in feeding the layer chicken. The main results of this study are as follows; First, feeding rations on the basics of statistics, internal maximum and minimum temperature and, the age at first egg affect the production of extra-large egg. Second, implicating the standardized coefficients from the conclusion of regression model estimating suggest that the amount of feed has the greatest impact on production followed by the age at first egg. Third, by using the elasticity of output and the volatility in the production, the result suggest that among the independent variable factors in the external volatility, the biggest one goes to feed ration, and the age at first egg follows. In order to control the production volatility in the extra-large egg production of the farms, it is necessary to manage an efficient feeding based on feed ration, age at first egg and, the maximum and minimum temperature inside the farm. Taken together, the results demonstrates that it should be concentrated by controlling the exogenous factors affecting extra large egg production and the management system construct, to increase extra-large egg production and the income of farmers at the same time.

A Study on the Analysis and Efficiency of Police Budget (경찰의 예산분석 및 효율화 방안에 관한 연구)

  • Park, Jong-Seung;Kim, Chang-Yun
    • Korean Security Journal
    • /
    • no.38
    • /
    • pp.7-32
    • /
    • 2014
  • This study is aimed to analyze problems of police budgetary execution and to suggest better ways for establishing effective budget implementation as well as legitimacy of securing budget in the field of police work. For this purpose, this paper analyzed the annual reports on police budgetary execution, from 2009 to 2012, conducted by National Assembly Budget Office. In result, most parts of the police budgetary execution were not satisfied with the audit standard, and especially in terms of management of budgetary execution, it showed 40% in inappropriateness. In addition, excessive and underestimate appropriation in the police budgetary execution, which happened frequently in other offices, was recorded on the second place. 10% of the amount of budget was executed for ordinance violence. Given results analyzed from each division, Transportation Division occupied 40% of the amount of related problems and all of types in the field did not meet the audit standard, thus it is required to manage budgetary execution effectively. In terms of Public Safety Division, the problem was related to budgetary allocation prior to execution, such as overlap in other works, excessive and underestimate appropriation, and inappropriate business plans. Director General for Planning and Coordination did not meet the standard of law system maintenance, Given the light of the result of analyzing programs, traffic safety and securing communication was the most problematic and support for police administration, crime prevention and protecting the disadvantaged, educating professional police officers, and establishment of policing infrastructure were required to be reformed in sequence. In order to resolve these problems, it is demanded to check budgetary execution and the process in business plans on a regular basis. Additionally, in case of using budget in inappropriate parts, tough penality including reduction of budget in related to the local police should be implemented to increase the importance of budgetary execution. Moreover, because of the fact that a part of problem of budgetary execution was originally caused by the budgetary allocation, it is advised to allocate police budget using the budget proposal of National Finance Act and Ministry of Strategy and Finance.

  • PDF

An Empirical Study on the Dual Burden of Married Working Women : Testifying the Adaptive Partnership, Dual Burden and Lagged Adaptation Hypotheses (근로기혼여성의 이중노동부담에 관한 실증연구: 가사노동분담에 관한 협조적 적응, 이중노동부담, 적응지체 가설의 검증)

  • Kim, Jin-Wook
    • Korean Journal of Social Welfare
    • /
    • v.57 no.3
    • /
    • pp.51-72
    • /
    • 2005
  • The purpose of this article is to empirically testify three hypotheses on the relation between married women's employment and the allocation of unpaid domestic work within households - i.e., adaptive partnership (AP), dual burden (DB) and lagged adaptation (LA) models. The AP hypothesis assumes that, when wives are employed, husbands spend more time doing housework in order to compensate for their wives' increased responsibility. The DB model, by contrast, indicates that, even if married women are employed, their burden on domestic work does not decrease. In this case, therefore, the dual burden of married women can be expected. Between these two opposite views, the third, alternative hypothesis has been suggested recently. The LA model argues that the behaviours of households are adaptive to the changing environments but over a period of many years and even across generations. The article has analysed the total work time as well as unpaid domestic work time to testify these three hypotheses, utilising 1999 Time Use Survey data of the National Statistical Office. The research results can be summarised as follows. First, married working women worked 100 minutes more than their male spouses. Second, the average domestic work time of married men, 23-25 minutes per day, was no more than 5-10% of that of women. Third, the effects of age and women's employment were not statistically significant in multiple regression models, which means that the DB hypothesis explains the situation of married working women in Korea. Based on these findings, the article suggested the expansion of the public social service system to mitigate the dual burden of married working women, the introduction of compensatory credit for caring work, and the directions of further empirical research using the time use survey data.

  • PDF

Development of Bicycle Accident Prediction Model and Suggestion of Countermeasures on Bicycle Accidents (자전거 사고예측모형 개발 및 개선방안 제시에 관한 연구)

  • Kwon, Sung-Dae;Kim, Yoon-Mi;Kim, Jae-Gon;Ha, Tae-Jun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.35 no.5
    • /
    • pp.1135-1146
    • /
    • 2015
  • This thesis aims to improve the safety of bicycle traffic for activating the use of bicycle, main means of non-powered and non-carbon transportation in order to cope with worldwide crisis such as climate change and energy depletion and to implement sustainable traffic system. In this regard, I analyzed the problem of bicycle roads currently installed and operated, and developed the bicycle accident forecasting model. Following are the processes for this. First, this study presented the current status of bicycle road in Korea as well as accident data, collect the data on bicycle traffic accidents generated throughout the country for recent 3 years (2009~2011) and analyzed the features of bicycle traffic accidents based on the data. Second, this study selected the variable affecting the number of bicycle accidents through accident feature analysis of bicycle accidents at Jeollanam-do, and developed accident forecast model using the multiple regression analysis of 'SPSS Statistics 21'. At this time, the number of accidents due to extension per road types (crossing, crosswalk, other single road) was used. To verify the accident forecast model deduced, this study used the data on bicycle accident generated in Gwangju, 2011, and compared the prediction value with actual number of accidents. As a result, it was found out that reliability of accident forecast model was secured through reconciling with actual number of cases except certain data. Third, this study carried out field survey on the bicycle road as well as questionnaire on satisfaction of bicycle road and use of bicycle for analysis of bicycle road problems, and presented safety improvement measures for the problems deduced as well as bicycle activation plans. This study is considered to serve as the fundamental data for planning and reorganizing of bicycle road in the future, and expected to improve safety of bicycle users and to promote activation of bicycle use as the means of transportation.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF